cve/2023/CVE-2023-6627.md

19 lines
864 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-6627](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6627)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%209.0.28%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The WP Go Maps (formerly WP Google Maps) WordPress plugin before 9.0.28 does not properly protect most of its REST API routes, which attackers can abuse to store malicious HTML/Javascript on the site.
### POC
#### Reference
2024-05-28 08:49:17 +00:00
- https://wpscan.com/blog/stored-xss-fixed-in-wp-go-maps-9-0-28/
- https://wpscan.com/vulnerability/f5687d0e-98ca-4449-98d6-7170c97c8f54
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds